Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMay 2006
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 102–113https://doi.org/10.1109/ISCA.2006.8This paper presents a high-availability system architecture called INDRA an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor (or CMP) with novel security and fault recovery mechanisms. INDRA represents ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
A Gracefully Degrading and Energy-Efficient Modular Router Architecture for On-Chip Networks
- Jongman Kim,
- Chrysostomos Nicopoulos,
- Dongkook Park,
- Vijaykrishnan Narayanan,
- Mazin S. Yousif,
- Chita R. Das
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 4–15https://doi.org/10.1109/ISCA.2006.6Packet-based on-chip networks are increasingly being adopted in complex System-on-Chip (SoC) designs supporting numerous homogeneous and heterogeneous functional blocks. These Network-on-Chip (NoC) architectures are required to not only provide ultra-...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
The BlackWidow High-Radix Clos Network
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 16–28https://doi.org/10.1109/ISCA.2006.40This paper describes the radix-64 folded-Clos network of the Cray BlackWidow scalable vector multiprocessor. We describe the BlackWidow network which scales to 32K processors with a worstcase diameter of seven hops, and the underlying high-radix router ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
SODA: A Low-power Architecture For Software Radio
- Yuan Lin,
- Hyunseok Lee,
- Mark Woh,
- Yoav Harel,
- Scott Mahlke,
- Trevor Mudge,
- Chaitali Chakrabarti,
- Krisztian Flautner
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 89–101https://doi.org/10.1109/ISCA.2006.37The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a minimum. These implementations are time consuming to design and difficult ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Program Demultiplexing: Data-flow based Speculative Parallelization of Methods in Sequential Programs
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 302–313https://doi.org/10.1109/ISCA.2006.31We present Program Demultiplexing (PD), an execution paradigm that creates concurrency in sequential programs by "demultiplexing" methods (functions or subroutines). Call sites of a demultiplexed method in the program are associated with handlers that ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Multiple Instruction Stream Processor
- Richard A. Hankins,
- Gautham N. Chinya,
- Jamison D. Collins,
- Perry H. Wang,
- Ryan Rakvic,
- Hong Wang,
- John P. Shen
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 114–127https://doi.org/10.1109/ISCA.2006.29Microprocessor design is undergoing a major paradigm shift towards multi-core designs, in anticipation that future performance gains will come from exploiting threadlevel parallelism in the software. To support this trend, we present a novel processor ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Flexible Snooping: Adaptive Forwarding and Filtering of Snoops in Embedded-Ring Multiprocessors
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 327–338https://doi.org/10.1109/ISCA.2006.21A simple and low-cost approach to supporting snoopy cache coherence is to logically embed a unidirectional ring in the network of a multiprocessor, and use it to transfer snoop messages. Other messages can use any link in the network. While this scheme ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Cooperative Caching for Chip Multiprocessors
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 264–276https://doi.org/10.1109/ISCA.2006.17This paper presents CMP Cooperative Caching, a unified framework to manage a CMP's aggregate on-chip cache resources. Cooperative caching combines the strengths of private and shared cache organizations by forming an aggregate "shared" cache through ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Chisel: A Storage-efficient, Collision-free Hash-based Network Processing Architecture
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 203–215https://doi.org/10.1109/ISCA.2006.14Longest Prefix Matching (LPM) is a fundamental part of various network processing tasks. Previously proposed approaches for LPM result in prohibitive cost and power dissipation (TCAMs) or in large memory requirements and long lookup latencies (tries), ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2 - ArticleMay 2006
Bulk Disambiguation of Speculative Threads in Multiprocessors
ISCA '06: Proceedings of the 33rd annual international symposium on Computer ArchitecturePages 227–238https://doi.org/10.1109/ISCA.2006.13Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperating speculative threads. In these environments, correctly maintaining data ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 34 Issue 2